Browse > Article
http://dx.doi.org/10.6109/jkiice.2016.20.8.1478

Implementation of Accessibility and Usability Enhancement Scheme for a WebRTC VC Application  

Lee, KyoungMin (Korea Institute of Science and Technology Information, KISTI)
Jo, Jinyong (Korea Institute of Science and Technology Information, KISTI)
Kong, JongUk (Korea Institute of Science and Technology Information, KISTI)
Abstract
This paper introduces technical methods to improve the accessibility and usability of a WebRTC video conference (VC) application. Simplified login is essential, by applying such as single sign-on (SSO) to improve the accessibility of VC applications. High usability and manageability are also necessary to attract more users, enhance user experiences, and save service management cost. The proposed VC application leverages SAML-based federated identity management (FIM) to enable higher service accessibility. Users can access the application with their organizational ID and SSO authentication. The FIM eases user ID management and indirectly strengthens privacy information protection. Proposed web application has high usability and manageability because users and/or administrators can easily create, join, monitor, or tear down VC sessions through RESTful web service (REST API). We verify the feasibility of the VC application after illustrating the SAML-based identity federation and the designed REST API.
Keywords
Video Conference; Federated Identity Management; SAML; REST API; WebRTC;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Childers, T. Disz, R. Olson, M.E. Papka, R. Stevens, and T. Udeshi, "Access Grid: Immersive group-to-group collaborative visualization," in Proceeding of the 4th International Immersive Projection Technology Workshop, 2011.
2 BigBlueButton official homepage [Internet]. Available: http://www.bigbluebutton.org/
3 Jitsi Meet Instant Video Conferences [Internet]. Available: https://jitsi.org/Projects/JitsiMeet
4 D. M. Smith and J. Lundy, "The Aragon Research GlobeTM for Web and Video Conferencing, 2015: Focus On Platforms and Outcomes," Aragon Research, Research Note No. 2015-51, 2014.
5 S.S.Y. Shim, G. Bhalla, and V.S. Pendyala, "Federated Identity Management," IEEE Computer, vol.38, no. 12, pp. 120-122, Dec. 2015.
6 J. Hughes and E. Maler, "Security Assertion Markup Language (SAML) 2.0 Technical Overview," OASIS, sstc-saml-tech-overview-2.0-draft-08, Sept. 2005.
7 S. Cantor, et al., "Shibboleth Architecture: Protocols and Profiles," Internet2-MACE, internet2-mace-shibboletharch-protocols-200509, Sept. 2005.
8 simpleSAMLphp official homepage [Internet]. Available: https://simplesamlphp.org
9 R.T. Fielding, "Architectural Styles and the Design of Network-based Software Architecture," Ph. D. dissertation, University of California, Irvine: CA, 2000.
10 IETF Std. Extensible Messaging and Presence Protocol (XMPP), IETF, Saint-Andre, Ed., 2004.
11 R. Widdowson and S. Cantor, "Identity Provider Discovery Service Protocol and Profile," OASIS Committee Specification 01, March, 2008.
12 Jetty Java HTTP web server and Java Servlet container [Internet]. Available: http://www.eclipse.org/jetty/